US8051156B1 - Managing power and performance - Google Patents
Managing power and performance Download PDFInfo
- Publication number
- US8051156B1 US8051156B1 US11/495,360 US49536006A US8051156B1 US 8051156 B1 US8051156 B1 US 8051156B1 US 49536006 A US49536006 A US 49536006A US 8051156 B1 US8051156 B1 US 8051156B1
- Authority
- US
- United States
- Prior art keywords
- network
- opc
- snmp
- devices
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5094—Allocation of resources, e.g. of the central processing unit [CPU] where the allocation takes into account power or heat criteria
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Definitions
- a data center is a location or facility that houses mainly electronic equipment, such as computers and communications equipment, for handling the data necessary for desired operations, such as information technology (IT) operations.
- IT information technology
- FIG. 1 illustrates a typical information architecture 100 for environmental and energy management of an environment.
- FIG. 2 illustrates a typical OPC architecture.
- FIG. 3 illustrates a typical SNMP-capable architecture.
- FIG. 4 illustrates a typical OPC architecture.
- FIG. 5 illustrates a SNMP framework that can be integrated into an existing SNMP-capable architecture, such as the one shown in FIG. 4 in accordance with one embodiment of the present invention.
- FIG. 6 illustrates an application of a SNMP proxy sub-agent in accordance with one embodiment of the present invention.
- FIG. 7 illustrates a process flow for integrating IT data and non-IT data in accordance with one embodiment of the present invention.
- FIG. 8 illustrates a typical WBEM architecture for a network.
- FIGS. 9A-B illustrate an integration of a WBEM architecture of an IT network with an OPC architecture of a facility management network.
- FIG. 10 illustrate a process flow for integrating IT data and non-IT data in accordance with another embodiment of the present invention.
- HVAC heating, ventilating and air-conditioning
- a typical information architecture for an environment such as a physical data center environment includes: a) a facility management network, such as a distributed control system (DCS) or a supervisory control and data acquisition (SCADA) system, for managing environmental conditions and energy usage of the desired environment; and b) an IT network for the data center that includes IT assets, such as computers, databases, network routers, internet connections, and intranet connections.
- a facility management network such as a distributed control system (DCS) or a supervisory control and data acquisition (SCADA) system, for managing environmental conditions and energy usage of the desired environment
- an IT network for the data center that includes IT assets, such as computers, databases, network routers, internet connections, and intranet connections.
- facility management is the management of buildings and services.
- the facility management network is employed to manage the administration, operations, and performance of various physical systems, and field devices therein, that are used to properly maintain the physical environment represented by the information architecture.
- Examples of such physical systems include but are not limited to cooling infrastructure with HVAC systems therein, security/alarm systems, fire/life safety systems, elevators/escalators systems, main/auxiliary power systems, and other mechanical/electro-mechanical systems.
- Most facility management networks are purpose-built networks with proprietary network protocols.
- a user accesses and manages a facility management network with an associated proprietary facility management control system that is both hardware and software driven.
- Examples of a facility management control system include APOGEE by Siemens AG of Germany; FORESEER by DataTrax of Raleigh, N.C.; Metasys by Johnson Controls, Inc. of Milwaukee, Wis.; and COMFORTPOINT by Honeywell of Morristown, N.J. Because of the proprietary nature of facility management networks, it is often difficult or tedious to design around the associated facility management control system in order to gain access to data or information about such networks.
- IT network is employed to manage IT aspects in the physical environment that is represented by the information architecture.
- IT refers to the management and processing of information with IT hardware, software, or both.
- IT aspects deal with the use of IT assets to transmit, receive, retrieve, store, protect, and process information and with the networking of such IT assets for such use.
- IT data includes data pertaining to the IT network.
- a user typically accesses and manages an IT network with an IT network management software.
- IT network management software examples include OPENVIEW of Hewlett Packard Company (HP) of Palo Alto, Calif., TIVOLI from IBM Corporation of Amonk, N.Y., and UNICENTER TNG from CA, Inc. (formerly, Computer Associates, Inc.) of Islandia, N.Y.
- a typical IT network management software employs different management protocols, such as the Simple Network Management Protocol (SNMP), or different management schemes, such as Web Based Enterprise Management (WBEM), to obtain IT data from and get notification of events that happen in the IT network.
- SNMP Simple Network Management Protocol
- WBEM Web Based Enterprise Management
- users wishing to access or manage the IT network through the IT asset management software include IT managers, system administrators, or any other IT personnel or entities that are interested in managing an IT network and IT assets therein.
- FIG. 1 illustrates a typical information architecture 100 for environmental and energy management of an environment, such as a data center, in which the methods and systems described herein are applicable.
- the information architecture 100 includes three layers: a field management layer 110 , a process management layer 120 , and a business management layer 130 .
- a data center is used throughout the present disclosure as a prime example of a physical environment, it should be understood that embodiments in the present application are applicable to any other physical environment that has an IT network and any other non-IT network that is desired or required to be integrated with the IT network for data sharing. Examples of other physical environments include offices, office buildings, corporate parks, corporate headquarters, homes, schools, or any other entities networked together for sharing of IT and other resources.
- the field management layer 110 includes “smart” field devices that provide a consistent access to a wide range of process-related, device-related, and network-related data.
- field devices exist in both the facility management network and the IT network.
- Examples of field devices in a facility management network include Human-Machine interfaces (HMIs) (that is, user interface or UI), Programmable Logic Controllers (PLCs), etc. for local control/access of computer room air conditioning (CRAC) units, Variable Frequency Drives (VFDs), power distribution units (PDUs), uninterruptible power supplies (UPSs), and a broad range of other sensors (such as thermostats or temperature sensors) and actuators and the like.
- HMIs Human-Machine interfaces
- PLCs Programmable Logic Controllers
- VFDs Variable Frequency Drives
- PDUs power distribution units
- UPSs uninterruptible power supplies
- Examples of field or network devices in an IT network for providing IT services include hosts, routers, gateways, terminal
- the process management layer 120 includes one or more of the aforementioned facility management control system, such as a DCS or a SCADA system, for monitoring and controlling processes and providing access to historical data and analysis as provided by the field management layer 110 .
- the business management layer 130 At the top of the information architecture 100 is the business management layer 130 , which provides integration of the information collected from those processes monitored and controlled by the process management layer 120 into business systems that manage the financial aspects of these processes.
- the key of the information architecture 100 is an open and effective communication architecture concentrating on data access and event handling.
- the information structure 100 includes an IT network, which supports and implements the field devices found in the field management layer 110 , the control systems found in the process management layer 120 , and the business systems found in the business management layer 130 .
- the IT network is managed by an IT network management software.
- IT management software such as HP OPENVIEW
- facility management software such as software associated with Siemens APOGEE, employed in a physical data center environment.
- Siemens APOGEE Siemens APOGEE
- FIG. 2 illustrates a typical SNMP-capable (or SNMP-enabled) architecture 200 set up by a standard IT network management software to manage an IT network.
- the SNMP-capable architecture 200 includes one or more network managers 210 , one or more management, or SNMP, agents, 220 , and one or more network elements 230 .
- the network managers 210 execute management applications to monitor and control the network elements 230 .
- each SNMP manager 210 contains one or more management functions and presents IT management information to the user of the IT asset management software.
- the network elements 230 represent physical devices such as hosts, routers, gateways, terminal servers, and the like that are typically found in an IT network.
- Each network element 230 is SNMP-capable so that it can communicate with and provide information to a SNMP manager 210 via a SNMP agent 220 .
- each device or network element 230 in the SNMP-capable architecture 200 is defined by a management information base (MIB), which is a database or data file that defines the device, or network element, as a set of one or more managed objects (MOs), through object identifiers.
- MIB management information base
- a MO is a parameter, attribute, or characteristic of the network element that is monitored by a SNMP agent 220 .
- a MO can be implemented as a programming code or programming object.
- a MIB is stored in each SNMP manager 210 to make visible those network elements 210 to which such a SNMP manager 210 has access via a SNMP agent 220 .
- the SNMP-capable architecture 200 is extensible by design through the addition of MOs for new devices or network elements in the MIB. Instances of MOs, that is, current values of the parameters or attributes that constitute the MOs, are stored in the SNMP agents 220 . Thus, a SNMP manager 210 perceives a SNMP agent 220 as a virtual data store or cache that is populated with instances of MOs of those network elements 230 that such a SNMP agent 220 processes.
- each SNMP agent implements SNMP, stores and retrieves management data from network elements 230 as defined by the MIB in a SNMP manager 210 , and performs network management functions requested by a SNMP manager 210 based on the stored or retrieved management data.
- the SNMP agents 220 are illustrated in FIG. 2 as being separate from the network elements 230 , it should be understood that the SNMP agent typically resides in a network element 230 .
- Two or more network elements 230 can have the same SNMP agent 220 or different SNMP agents 220 .
- three network elements 230 have the same SNMP agent 220 a , which resides in each of these three network elements 230 .
- two network elements 230 have the same SNMP agent 220 a , which resides in each of these two network elements 230 .
- only one network element 230 includes the SNMP agent 220 c residing therein.
- FIG. 2 also illustrates that each network element 230 can be accessed, via its SNMP agent 220 , by one or more SNMP managers 210 .
- each SNMP manager 210 can contact one or more network elements 230 .
- Each network element 230 is operable to initiate communication with a SNMP manager 210 via its SNMP agent 220 , which then sends traps, which are messages initiated by the SNMP agent 220 to the SNMP manager 210 .
- traps include special events, such as failures of links, that a SNMP agent 220 of a network element 230 sends to the SNMP manager 210 to notify the user of the IT asset management software that there is a failure of a communication link between the particular network element 230 and the particular SNMP manager 210 .
- the IT network management software is typically implemented by a computerized system that is connected to the IT network that is being monitored and managed by such a software.
- a computerized system include but are not limited to one or more desktop computers, one or more laptop computers, one or more mainframe computers, one or more networked computers, one or more processor-based devices, or any similar types of systems and devices.
- a computerized system includes one or more processors of any of a number of computer processors, such as processors from Intel, Motorola, AMD, Cyrix.
- Each processor is coupled to or includes at least one memory device, such as a computer readable medium (CRM).
- the processor is operable to execute computer-executable program instructions stored in the CRM, such as program code of applications, to run the applications.
- the computer-executable program instructions include code from any suitable computer-programming language, such as C, C++, C#, Java, or the like.
- Embodiments of a CRM include, but are not limited to, an electronic, optical, magnetic, or other storage device capable of providing a processor of the server with computer-readable instructions.
- Other examples of a suitable CRM include, but are not limited to, a floppy disk, CD-ROM, DVD, magnetic disk, memory chip, ROM, RAM, an ASIC, a configured processor, any optical medium, any magnetic tape or any other magnetic medium, or any other medium from which a computer processor is operable read instructions.
- the IT network management software including its SNMP managers 210 , can be implemented as computer-executable program instructions of one or more software programs or modules stored on a CRM accessible by the computerized system for execution by its processor(s).
- each SNMP agent can reside in a network element 230 as computer-executable program instructions of one or more software programs or modules stored on a CRM in the network element 230 .
- FIG. 3 illustrates a typical SNMP-capable architecture 300 , which the SNMP-capable architecture 200 in FIG. 2 expanded to further illustrate the use of SNMP proxy agents.
- the SNMP-capable architecture 300 includes one or more SNMP managers 210 , one or more SNMP agents 220 , one or more SNMP-capable network element 230 .
- the SNMP-capable architecture 300 includes one or more SNMP proxy agents 320 (only one is illustrated) for accessing a non-SNMP management system 330 , and those non-SNMP managed elements 340 thereof.
- the non-SNMP management system 330 (and its managed elements 340 ) can be, for example, the facility management control system typically found in an information architecture, as discussed earlier.
- the communication protocol between the SNMP proxy agent 320 and the non-SNMP management system 330 is often proprietary because it depends on the proprietary specifications of the latter.
- the SNMP proxy agent 320 includes a MIB that reflects the proprietary management information on the “real agent” of each managed element 340 in the non-SNMP management system 330 .
- These real agents are the actual destination agents that the SNMP managers 210 desire to reach. Consequently, the typical SNMP proxy architecture 300 remains dependent on the proprietary nature of the non-SNMP management system 330 .
- the SNMP proxy agent 320 must then keep track of multiple proprietary protocols, or multiple SNMP proxy agents 320 are needed, each keeping track of a particular proprietary protocol of the non-SNMP management system 330 that it is designed to access.
- OPC Object Linking and Embedding
- OPC provides a standard mechanism for communicating to numerous data sources, such as field devices and IT databases. It draws a line, that is, provides an interface, between hardware providers and software developers.
- OPC architecture eliminates the propriety of a typical facility management network and brings it to a standard level. It provides a set of connectivity standards for communicating data from a data source to any client application in a standard way with a standard set of application programming interfaces (APIs), standard commands, and standardized events.
- APIs application programming interfaces
- the OPC architecture further leverages the advantages of the component object model (COM) interface or the .NET Framework component from Microsoft to provide a user with one or more OPC servers for: a) Online DataAccess (DataAccess), for efficient reading and writing of current data between an application and a process control device flexibly and efficiently; b) Alarm and Event Handling (Alarm&Event) mechanisms or interfaces for OPC Clients to be notified of the occurrence of specified events and alarm conditions, to determine the events and conditions supported by an OPC server, and to obtain the current status of such events and conditions; and c) Historical Data Access (HistoricalData) mechanisms or interfaces for the reading, processing and editing of data of a historian engine.
- COM component object model
- .NET Framework component from Microsoft to provide a user with one or more OPC servers for: a) Online DataAccess (DataAccess), for efficient reading and writing of current data between an application and a process control device flexibly and efficiently; b) Alarm and Event Handling (Alarm&Event) mechanisms or interfaces
- OPC DataAccess, Alarm&Event, and HistoricalData functionalities can be implemented together in a single OPC server or separately in different OPC servers.
- a user is able to develop reusable, highly optimized OPC servers to communicate to data sources, and maintain a standard mechanism to access data from the data sources efficiently with standard commands and to take such data sources through standardized events.
- a server is any computerized system that provides services to other computerized or computing systems (clients) over a network.
- each OPC server provides an OPC interface to allow any client to access its devices, regardless of the manufacturer(s) of such devices.
- One side of the OPC server is the proprietary side of the hardware providers with their specific logic or protocol to communicate with their proprietary devices.
- the other side of the OPC server is the application side of the software developers, whereby one or more standardized OPC interfaces are provided for the software developers to access the proprietary devices through the specific logic or protocol without the need to fully understand the make-up of such specific logic.
- an OPC server is provided with DataAcess functionality to provide a robust gateway for accessing facilities data and communicating such data to field devices in a facility management network.
- a typical OPC server includes an OPC server object, one or more OPC group objects, and one or more OPC item objects for providing DataAccess.
- the OPC server object maintains information about the OPC DataAccess server and stores OPC group objects.
- each OPC group object maintains data about itself and provides a mechanism for storing and logically indexing or organizing OPC items.
- OPC item objects that can be defined by an OPC client application.
- Each OPC item object represents a connection to a data source, such as a field device in the facility management network, and not the data source itself.
- OPC item object is not accessible by an OPC client application. Thus, there is no external interface defined for an OPC item object. All access to OPC items is via an OPC group object that stores or maintains the OPC item object, or simply where the OPC item is defined.
- OPC Alarm & Event interfaces in an OPC server include OPC objects for notifying OPC clients of specified alarms, specified conditions, specified events, or any combinations thereof.
- OPC HistoricalData interfaces in an OPC server include OPC objects for accessing any historical data stored in the OPC architecture that relates to a component of the OPC architecture.
- the aforementioned OPC objects in one or more OPC servers are OPC software or programming objects residing in the CRMs of the OPC servers. Typically, these OPC objects are programming objects based on component object model (COM).
- COM component object model
- FIG. 4 illustrates a typical OPC architecture 400 that includes an OPC server 410 , which is coupled to one or more OPC interfaces 450 for transferring data as received from a control system, such as the SCADA system 420 , to one or more client applications 460 .
- the OPC server 410 is any server that provides OPC interfaces for OPC DataAccess functionality, Alarm&Event functionality, HistoricalData functionality, or any combination thereof.
- the SCADA system 420 is also able to retrieve raw data from physical devices, such as physical I/O or field devices 440 , through the OPC server 410 and OPC interfaces 450 , or through a physical interface 470 .
- a proprietary physical interface or a standard physical interface 470 (such as, ModBus, LonTalk, etc.) is provided.
- the design of the OPC architecture 400 also makes possible the OPC Server, such as the OPC server 410 , which allows a client application 460 to access data from many OPC servers provided by many different OPC vendors running on different nodes via a single defined object.
- the field devices 430 and 440 are in the field management layer 110
- the SCADA system 420 is in the process management layer 120 .
- a user with access to the IT network can further coordinate thermal management with utility computing management in a data center to provide efficient energy management for the data center. For example, increased cooling and ventilation are desired for the data center during peak computing periods to maintain the stability and accuracy of the electronic equipment. On the other hand, decreased cooling and ventilation are desired for the data center during off-peak periods and down times to conserve energy.
- the SNMP and OPC architecture are employed together to integrate an IT network with a facility management network in an information architecture in order to provide communication between the IT management software and facility management software for the exchange of network information.
- the aforementioned SNMP proxy-agent architecture is leveraged to create SNMP proxy agents for such field devices.
- it is possible to create SNMP proxies for systems that do not support SNMP by obtaining the non-SNMP system's data through an extensible SNMP agent system.
- the HP OPENVIEW Extensible SNMP Agent software can be employed to implement a SNMP proxy agent that enables rapid development of instrumentation to manage proprietary data.
- FIG. 5 illustrates a SNMP framework 500 that can be integrated into an existing SNMP-capable architecture, such as the OPC architecture shown in FIG. 4 , to enable integration of an OPC architecture for a physical environment, such as a facility management network, with a SNMP-capable IT network according to one embodiment.
- the integrated framework 500 includes a SNMP manager 510 , which is a network manager in a SNMP-capable architecture for an IT network similar to the SNMP manager 210 illustrated in FIG. 2 . Although only one SNMP manager 510 is illustrated, it should be understood that more than one SNMP manager 510 potentially exist in the integrated framework 500 , similar to FIG. 2 .
- the integrated framework 500 further includes a SNMP proxy agent 520 for accessing information about a non-SNMP management system, such as a facility management network, and those managed elements, such as field devices, therein.
- the SNMP proxy agent 520 includes one or more SNMP proxy sub-agents 530 for accessing the facility management network.
- Each SNMP proxy sub-agent 530 is tasked with accessing a portion of or the whole facility management network, as desired, based on the managed objects contained in its MIB 540 .
- the MIB 540 of each SNMP proxy sub-agent 530 determines how much visibility the SNMP-capable IT network will have of the non-SNMP devices in the facility management network. In other words, non-SNMP devices do not have their own MIBs and appear on the SNMP-capable IT network because their MOs are listed in the MIB of a SNMP proxy agent or sub-agent within the SNMP proxy-agent.
- the SNMP proxy agent 520 is an extensible SNMP agent system that enables rapid development of instrumentation to manage proprietary data of the facility management network. This is because each SNMP proxy sub-agent 530 can be used to access a different non-SNMP system. As new non-SNMP systems are desired to be visible through the IT network, additional SNMP proxy sub-agents 530 can be added in the SNMP proxy agent 520 to access those new systems via OPC interfaces, as further described below.
- FIG. 6 illustrates the application of a proxy-subagent 530 in FIG. 5 to leverage the OPC architecture of the facility management network in order to access information therein.
- new MOs for the integrated SNMP framework 500 are defined as existing OPC programming objects 550 for those field devices in the facility management network that are desired or required to be SNMP-capable or visible to the integrated SNMP framework 500 .
- the field devices are those typically found in a cooling infrastructure. Examples of such field devices include HMIs (e.g., thermostats), PLCs for local control/access of CRAC units, VFDs and PDUs for driving HVAC systems, and volume air-handling units in HVAC systems.
- HMIs e.g., thermostats
- PLCs for local control/access of CRAC units
- VFDs and PDUs for driving HVAC systems
- volume air-handling units in HVAC systems volume air-handling units in HVAC systems.
- the new MOs represent parameters, attributes, or characteristics of such field devices.
- the MOs are defined by the
- the new MOs are defined as existing OPC server objects, group objects, and item objects in an existing OPC DataAccess server of the facility management network, as any OPC programming objects associated with the existing OPC Alarm&Event server, any OPC programming objects associated with the existing OPC HistoricalData server, or any combinations thereof.
- the new MOs are then arranged as object identifiers in a new MIB subtree (or subset), which may be stored in a MIB 540 of a respective SNMP proxy sub-agent 530 .
- the new MIB subtree extends the already-existing MIB 515 in the SNMP manager 510 .
- the new MIB subtree is incorporated into the MIB 515 within the SNMP manager 510 .
- the SNMP proxy sub-agent 530 may specify commands for each OPC object 550 that utilize the OPC interface to obtain data from an existing OPC server 610 , which can then access data from field devices, a DCS, a SCADA, or any combination thereof (illustrated in FIG. 3 ) via path 640 .
- the SNMP proxy sub-agent 530 is able to read from a file or query a database 630 that has already been created by an OPC client 620 via path 650 .
- event-based notification system can be setup in both paths 640 and 650 to handle alarms and change of value of sensors and actuators in the field devices of the facility management network.
- each SNMP proxy sub-agent 530 illustrated in FIG. 5 is used to access a particular OPC server 610 .
- one SNMP proxy sub-agent 530 is for accessing an OPC DataAccess server, one for accessing an OPC Alarm&Event server, and one for accessing an OPC HistoricalData server, whereby these three OPC servers can belong to an OPC architecture of a single non-IT network or to multiple OPC architectures of multiple different non-IT networks.
- SNMP proxy sub-agents 530 are not required.
- the SNMP proxy agent 520 itself can maintain an MIB 540 and functions likes a SNMP proxy sub-agent 530 to access the OPC server.
- Alternative embodiments are contemplated wherein multiple OPC servers may be accessible by a single SNMP proxy sub-agent 530 or a single SNMP proxy agent 540 with the use of sub-agents 530 therein.
- the SNMP proxy sub-agents 530 contain critical information about the field devices or applications that they manage through their management interfaces, SNMP authentication is desired to safeguard such critical information and allow only authorized access to and operations on such information.
- SNMP version versions
- SNMP implementations often support multiple of such versions.
- the SNMP version (versions) that are implemented for the integration of the SNMP-capable architecture with the OPC architecture depend on the version (or versions) that are in use in the SNMP-capable architecture prior to such an integration.
- SNMP authentication associated with the initially implemented with the SNMP version (or versions) are also employed to restrict access to the integrated architecture to authorized users and ensure security from hackers and trespassers.
- FIG. 7 illustrates a process 700 for integrating facilities data, or any other non-IT data from a non-IT network, with IT data in an IT network to enable a holistic view of an overall information architecture of a physical environment, from its external environment to its network and workload distribution, in a single location, for better management.
- an IT network of a desired physical environment to be monitored is identified and chosen as the IT network for accessing data from other networks, IT or non-IT.
- the identification can be done manually by the user upon observing and analyzing the physical environment.
- the identification can be done by an IT network management software, such as HP OPENVIEW, running on a computerized system that is connected to the IT network for analysis.
- a SNMP-capable architecture it is determined whether a SNMP-capable architecture has been set up for the IT network. In other words, it is determined whether the IT network is SNMP capable or enabled. Typically, if the IT network has been analyzed by an IT network management software, such as HP OPENVIEW, it has been set up with a SNMP-capable architecture for the analysis. Otherwise, a SNMP-capable architecture for the IT network should be set up with software such as an IT network management software.
- an interested non-IT network of the physical environment is identified. This can be accomplished by using any commercially-available management software or one associated with such a non-IT network. For example, if the interested non-IT network is a facility management network, a commercially-available management software such as Siemens APOGEE can be used.
- the user is provided access to the non-IT network and data therein via the SNMP-capable architecture set up for the IT network and the OPC interface set up for the non-IT network.
- This entails adding a SNMP proxy agent to the SNMP-capable architecture of the IT network, storing OPC programming objects found in one or more OPC servers that were set up to provide an OPC interface to the non-IT network as MOs in the SNMP proxy agent so that data from devices or elements from the non-IT network can be retrieved by the user at the IT network through their represented MOs found in the SNMP proxy agent.
- SNMP proxy agent 520 With facilities data available through the SNMP proxy agent 520 and one or more SNMP proxy subagents 530 therein, IT personnel is able to access and use feedback of such data to better understand the environmental effects of IT application deployments, such as thermal effects and power consumption, and make better decisions on how to deploy IT applications for energy-efficient thermal management. Any one of such applications is capable of addressing a message directly to the destination (foreign) agent, whereby a SNMP application programming interface (API) in the SNMP manager 510 is operable to determine which host is the proxy and send the message accordingly.
- API application programming interface
- WBEM is an industry-initiated systems management architecture initiative for accessing and sharing management information in an enterprise network.
- the WBEM architecture has been standardized by the Distributed Management Task Force (DMTF), a standards organization founded in 1992 by various organization and companies. Because a WBEM architecture is operable to manage many types of system, including computer networks, it is operable to manage an IT network as well.
- the WBEM architecture is capable of providing a common management interface to the IT network so as to simplify and reduce the cost of management.
- FIG. 8 illustrates a typical WBEM architecture 800 that can be set up by a standard IT network management software to manage an IT network.
- the WBEM architecture 800 is made up of the following standards: a Common Information Model (CIM), CIM in eXtensible Markup Language (XML), and CIM operations over HyperText Transport Protocol (HTTP). With regard to CIM operations over HTTP, they are also applicable to HyperText Transport Protocol Secured (HTTPS). Thus, any discussion of HTTP with regard to the WBEM architecture 800 is also applicable to HTTPS.
- the WBEM architecture 800 also includes the following components: a CIM Object Manager (CIMOM) 810 , one or more WBEM providers 820 , and one or more WBEM clients 830 .
- CIMOM CIM Object Manager
- a CIM is an object-oriented data model for describing various entities (such as computing and business entities) in Internet, enterprise, and service provider environments. It enables application developers to code their client applications so that such applications may interact with the CIMOM 810 using a predefined, platform independent, set of Application Program Interfaces (APIs). This enables the CIMOM 810 to startup and load any CIM-compliant managed device 840 via a WBEM provider 820 , which is a piece of software code that can call whatever routines needed to gather data in order to provide the necessary objects in a CIM schema.
- the CIMOM 810 includes a repository 812 , which stores all CIM schemas used to verify that data sent by the WBEM providers 820 and WBEM clients 830 are correct.
- a CIM schema is a collection of related CIM classes.
- Each CIM schema includes a core model and a common model to provide an actual model's descriptions, captures notions that are applicable to common areas of management, and is independent of implementation.
- the core model is an information model that captures notions that are applicable to all areas of management. Thus, it is a management model that describes some basic classes that can be applied in any management system, and every management model in CIM can use this schema as a base, that is, inherit from the classes in the core model.
- the common model is an information model that captures notions that are common to particular management areas, but independent of a particular technology or implementation.
- each standard CIM schema also includes a standard common model predefined by the DMTF.
- Examples of a standard common model include a computer network model, a devices model, a databases model, and an operating systems model. Additional CIM schemas called extension schemas can be created as needed by extending as desired one of the standard CIM schema for a common model published by the DMTF and found at http://www.dmtf.org.
- a typical CIM includes components or elements, such as classes (and subclasses), properties, methods, qualifiers, associations, and instances, that are defined or specified in a text format called Managed Object Format (MOF). It is also possible to represent the CIM in XML or in a visual format, such as the Uniform Modeling Language (UML) format. As indicated earlier, CIM in XML is one of the three WBEM standards. The CIM provides a consistent definition and structure of management information for the WBEM, which includes protocols, query languages, discovery mechanisms, mappings, to name a few, that are needed to exchange CIM information in an interoperable and efficient manner that is independent of the device or devices being managed.
- WBEM Management Information
- CIM can be used to model computer elements, organization structures, organic materials, physical buildings, etc.
- the WBEM architecture 800 can be set up with the standard CIM schema for “Network,” which is already published by the DMTF, stored in the repository 812 of the CIMOM 810 .
- the CIMOM 810 is configured such that it can determine which WBEM provider 820 is providing the desired information (for example, the amount of available memory in a database). Furthermore, the CIMOM 810 is configured to “ask” for and receive such information from a WBEM provider 820 .
- FIG. 8 illustrates a single WBEM server 805 with a CIMOM 810 therein, it should be understood that multiple WBEM servers 805 , each with a CIMOM 810 , are operable in the WBEM architecture 800 to access various different managed devices 840 in accordance with different CIM schemas.
- the CIM standard also can be found at http://www.dmtf.org.
- Each WBEM client 830 provides an interface between a manager 850 and the CIMOM 810 .
- the WBEM client 830 can include management applications to monitor and control one or more managed devices 840 . If a WBEM client 830 wishes to modify or access data from one of the managed devices 840 , the CIMOM 810 is responsible for calling the correct WBEM provider 820 associated with such a managed device 840 . In turn, the correct WBEM provider 820 modifies or accesses the particular managed device 840 in accordance with the request from the WBEM client 830 .
- CIM Operations over HTTP A standard protocol called CIM Operations over HTTP is employed for communication between each WBEM client 830 and the CIMOM 810 , as illustrated in FIG. 8 .
- All CIM information exchanged between the WBEM clients 830 and the WBEM server 805 are CIM messages, which are protocol independent and include CIM operations.
- CIM messages can be transmitted using any protocol.
- HTTP is chosen as a standard for CIM operations because of its wide usage on the Internet, reliability running on top of TCP/IP, and security when HyperText Transport Protocol Secured (HTTPS) is used.
- HTTPS HyperText Transport Protocol Secured
- one of the standards of WBEM is CIM Operations over HTTP, which provides a specification of how to exchange CIM information over the HTTP by defining all CIM operations allowed in the CIM messages.
- a CIM operation can be a simple method for a defined class in a CIM schema or one of the operations for manipulating CIM data predefined in the “CIM Operations over HTTP” specification.
- Each WBEM provider 820 can be implemented by programming code to provide an interface between one or more managed resources or devices 840 and the WBEM server 805 . It is suitably configured to extract information from the various managed devices 840 with which it may be associated. For example, in a multi-disc or tape database, a database provider is configured to obtain necessary information from each object in the database. Such information might include available memory, file allocations, and other information.
- FIG. 8 depicts a single managed device 840 associated each WBEM provider 820 , it should be understood that each WBEM provider 820 is capable of extracting information from more than one managed device 840 . Similar to a network element 230 in FIG.
- each managed device 840 is a MO representing a physical device such as host, routers, gateways, terminal servers, and the like that are typically found in an IT network.
- the WBEM providers 820 and the CIMOM 810 can reside on the same computer system, such as the WBEM server 805 depicted in FIG. 8 .
- the WBEM providers 820 and the CIMOM 810 reside on different computer systems.
- communication between the WBEM providers 820 and their associated managed devices 840 is proprietary or specific to each managed device 840 .
- the WBEM server 805 further includes a CIM-XML protocol adapter 815 , and CIM-XML indication handler 817 .
- the WBEM server 805 receives and processes CIM operation message requests from the WBEM clients 830 and issues CIM operation message responses back to the WBEM clients 830 .
- the CIM-XML indication handler 817 receives indications, or event notifications, at one or more of the managed devices 840 , performs the mapping between the internal representation of each CIM indication and the desired format (such as XML) and protocol (such as HTTP), and sends such CIM indication to the designated destination (such as one of the managers 850 ).
- the CIM-XML protocol adapter 815 enables the CIMOM 810 to communicate with the WBEM clients 830 using CIM Operations over HTTP, which is further described later as well.
- WBEM and OPC architectures together to integrate an IT network with a FM network in an information architecture in order to also provide communication between the IT management software and facility management software for the exchange of network information.
- FIGS. 9A-B illustrate a WBEM architecture 910 for an IT network integrating with an OPC architecture 950 for a physical environment, such as a FM network, to enable user access to the FM network from the IT network, in accordance with an embodiment.
- the WBEM architecture 900 for the IT network includes a WBEM server 905 and one or more WBEM clients 930 that operating in a similar manner to the WBEM clients 830 .
- the WBEM server 905 includes a CIMOM 910 , a CIM-XML protocol adapter 915 , a CIM-XML indication handler 917 , and one or more WBEM providers 920 .
- the repository 912 for storing CIM schemas for managing both the IT network and the FM network as represented by the OPC architecture 950 .
- the repository 912 not only stores the CIM schema for “Network” to access and manage the IT network, but it also stores one or more standard CIM schemas for “Devices” to access and manage field devices in the FM network through the available OPC DataAccess functionality of the OPC architecture for the FM network, one or more standard CIM schemas for “Event” to be notified of events and conditions in the FM network through the available OPC Alarm&Event functionality of the OPC architecture for the FM network, and one or more standard CIM schemas for “Database” to access any historical database in the FM network through the available OPC HistoricalData functionality of the OPC architecture for the FM network.
- the CIM classes are defined in accordance with the existing OPC server objects for the DataAccess functionality in the OPC server 960 in order to maintain information about such OPC server.
- the CIM subclasses are defined in accordance with the existing OPC group objects for the DataAccess functionality in the OPC server 960
- the CIM instances are defined in accordance with the existing OPC item objects for the DataAccess functionality in the OPC server 960 that represent connections to the field devices and other physical I/O devices 430 and 440 .
- the field devices of management interest to users of the IT network are related to the cooling infrastructure, such as HVAC systems, in the FM network.
- each CIM Event schema is created by defining its CIM classes (and subclasses) and instances in accordance with the existing OPC programming objects for the Alarm&Event functionality of the OPC server 960 .
- each CIM Database schema is created by defining its CIM classes (and subclasses) and instances in accordance with the existing OPC programming objects for the HistoricalData functionality of the OPC server 960 .
- the OPC architecture 950 includes an OPC server 960 , which is coupled to one or more OPC interfaces 965 for transferring data as received from a control system, such as the SCADA system 970 , to one or more WBEM providers 920 in the WBEM architecture 910 .
- the WBEM providers 920 act as OPC client applications to gather data in order to provide the necessary objects in the CIM schemas stored in the repository 912 of the WBEM architecture 920 that represent the FM network and the field devices 980 being managed therein.
- FIG. 10 illustrates a process 1000 for integrating facilities data, or any other non-IT data from a non-IT network, such as a FM network, with IT data in an IT network via the integrated WBEM-OPC architecture depicted in FIGS. 9A-B .
- an IT network of a desired physical environment to be monitored is identified and chosen as the IT network for accessing data from other networks, IT or non-IT.
- the identification can be done manually by the user upon observing and analyzing the physical environment. Alternatively, the identification can be done by an IT network management software, running on a computerized system that is connected to the IT network for analysis.
- a WBEM architecture has been set up for the IT network.
- the IT network management software that could identify the IT network may have been used to set up the WBEM architecture for the IT network.
- an identification of such a management software would indicate that a WBEM architecture for the IT network has been set up for the IT network.
- an IT network management software such as a HP WBEM Services Software Developers Kit, can be used to set up the WBEM architecture for the IT network.
- an interested non-IT network of the physical environment is identified. This can be accomplished by using any commercially-available management software or one associated with such a non-IT network. For example, if the interested non-IT network is a facility management network, a commercially-available management software such as Siemens APOGEE can be used.
- the user is provided access to the non-IT network and data therein via the WBEM architecture 910 set up for the IT network and the OPC architecture 950 set up for the non-IT network.
- GUI graphical user interface
- BAI browser user interface
- CIM command-line interface
- the user interface communicates with the WBEM clients 930 through a set of APIs.
- WBEM clients 930 then construct a CIM message with the user request.
- CIM graphical user interface
- BUI browser user interface
- CIM command-line interface
- the WBEM client 930 uses a communication protocol, such as HTTP (or HTTPS) in accordance with the CIM Operations over HTTP standard, to send the CIM-XML encoded user request to a corresponding WBEM server 905 , which uses the CIM-XML protocol adapter 915 to communicate with the WBEM client 930 using CIM Operations over HTTP. While using the HTTPS WBEM connection, it is important for the WBEM client 930 to verify and authenticate unknown WBEM certifications before accepting them as valid certificates.
- HTTP or HTTPS
- the WBEM server 905 decodes the user request passed by the WBEM client 930 , as facilitated by the CIM-XML protocol adapter 915 , performs the required authentication and authorization checks to ensure it is a valid system login for an authorized user, and consults the CIMOM 910 and the repository 912 therein for a previously-created CIM schema of a managed device 940 to see how the user request should be handled. Only valid CIM operations are accepted. For example, the CIMOM 910 determines from a previously-created CIM schema that it needs to communicate with one or more managed devices 940 (hardware or software) to satisfy the user request. This communication is handled by the WBEM providers 920 as noted earlier.
- each WBEM provider 940 is responsible for any additional user authorization, for performing the action relating to the user request, and for returning a response to the CIMOM 910 , which then sends the response back to the WBEM client 930 and onward to the manager 950 that initiated the user request.
- the WBEM architecture 900 also allows a managed device 940 to initiate communication with one of the managers 950 for event notification.
- An event is the occurrence of a phenomenon of interest.
- An event can be defined to indicate, for example, the occurrence of a disk write error, a failed authentication attempt, or a even a mouse click.
- the CIM-XML indication handler 917 within the WBEM server 905 uses CIM-XML format (or any format used by the CIMOM 910 and the WBEM clients 930 to send an indication representing an event notification to a specified manager 950 as the destination.
Abstract
Description
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/495,360 US8051156B1 (en) | 2006-07-28 | 2006-07-28 | Managing power and performance |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/495,360 US8051156B1 (en) | 2006-07-28 | 2006-07-28 | Managing power and performance |
Publications (1)
Publication Number | Publication Date |
---|---|
US8051156B1 true US8051156B1 (en) | 2011-11-01 |
Family
ID=44839678
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/495,360 Expired - Fee Related US8051156B1 (en) | 2006-07-28 | 2006-07-28 | Managing power and performance |
Country Status (1)
Country | Link |
---|---|
US (1) | US8051156B1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070226317A1 (en) * | 2006-02-21 | 2007-09-27 | Rydberg Kris M | System, method, and device for communicating between a field device, device controller, and enterprise application |
US20100115305A1 (en) * | 2008-11-03 | 2010-05-06 | Hitachi, Ltd. | Methods and Apparatus to Provision Power-Saving Storage System |
US20110106934A1 (en) * | 2008-04-17 | 2011-05-05 | Ashok Sadasivan | Method and apparatus for controlling flow of management tasks to management system databases |
US20130275543A1 (en) * | 2012-04-13 | 2013-10-17 | Citrix System, Inc. | Systems and methods for caching snmp data in multi-core and cluster systems |
US20150039135A1 (en) * | 2012-03-30 | 2015-02-05 | Hitachi Appliances, Inc. | Air-conditioning control system and air-conditioning control method |
WO2016025524A1 (en) * | 2014-08-11 | 2016-02-18 | Nodeprime, Inc. | Systems for managing datacenters |
US20160087958A1 (en) * | 2014-09-23 | 2016-03-24 | Accenture Global Services Limited | Industrial security agent platform |
US20160191318A1 (en) * | 2014-12-31 | 2016-06-30 | Schneider Electric Usa Inc. | Systems and methods for programmable device installations |
DE102015212026A1 (en) * | 2015-06-29 | 2016-12-29 | Siemens Aktiengesellschaft | A method of operating a network with multiple node devices and a network |
US10516734B2 (en) | 2014-12-16 | 2019-12-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Computer servers for datacenter management |
US11423089B2 (en) * | 2019-09-25 | 2022-08-23 | Dell Products L.P. | System and method for determining application programming interface and object bindings on natural language processed inputs |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020007464A1 (en) * | 1990-06-01 | 2002-01-17 | Amphus, Inc. | Apparatus and method for modular dynamically power managed power supply and cooling system for computer systems, server applications, and other electronic devices |
US20040006652A1 (en) * | 2002-06-28 | 2004-01-08 | Prall John M. | System event filtering and notification for OPC clients |
US6728262B1 (en) * | 2000-10-02 | 2004-04-27 | Coi Software, Inc. | System and method for integrating process control and network management |
US20040158625A1 (en) * | 2002-12-30 | 2004-08-12 | Wind River Systems, Inc. | System and method for efficient master agent utilization |
US20040177357A1 (en) * | 2003-02-05 | 2004-09-09 | Siemens Aktiengesellschaft | Web-based presentation of automation processes |
-
2006
- 2006-07-28 US US11/495,360 patent/US8051156B1/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020007464A1 (en) * | 1990-06-01 | 2002-01-17 | Amphus, Inc. | Apparatus and method for modular dynamically power managed power supply and cooling system for computer systems, server applications, and other electronic devices |
US6728262B1 (en) * | 2000-10-02 | 2004-04-27 | Coi Software, Inc. | System and method for integrating process control and network management |
US20040006652A1 (en) * | 2002-06-28 | 2004-01-08 | Prall John M. | System event filtering and notification for OPC clients |
US20040158625A1 (en) * | 2002-12-30 | 2004-08-12 | Wind River Systems, Inc. | System and method for efficient master agent utilization |
US20040177357A1 (en) * | 2003-02-05 | 2004-09-09 | Siemens Aktiengesellschaft | Web-based presentation of automation processes |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8266308B2 (en) * | 2006-02-21 | 2012-09-11 | Comtrol Corporation | System, method, and device for communicating between a field device, device controller, and enterprise application |
US20070226317A1 (en) * | 2006-02-21 | 2007-09-27 | Rydberg Kris M | System, method, and device for communicating between a field device, device controller, and enterprise application |
US20110106934A1 (en) * | 2008-04-17 | 2011-05-05 | Ashok Sadasivan | Method and apparatus for controlling flow of management tasks to management system databases |
US8706858B2 (en) * | 2008-04-17 | 2014-04-22 | Alcatel Lucent | Method and apparatus for controlling flow of management tasks to management system databases |
US20100115305A1 (en) * | 2008-11-03 | 2010-05-06 | Hitachi, Ltd. | Methods and Apparatus to Provision Power-Saving Storage System |
US8155766B2 (en) * | 2008-11-03 | 2012-04-10 | Hitachi, Ltd. | Methods and apparatus to provision power-saving storage system |
US9651272B2 (en) * | 2012-03-30 | 2017-05-16 | Hitachi Appliances, Inc. | Air-conditioning control system and air-conditioning control method |
US20150039135A1 (en) * | 2012-03-30 | 2015-02-05 | Hitachi Appliances, Inc. | Air-conditioning control system and air-conditioning control method |
US20130275543A1 (en) * | 2012-04-13 | 2013-10-17 | Citrix System, Inc. | Systems and methods for caching snmp data in multi-core and cluster systems |
US9817789B2 (en) * | 2012-04-13 | 2017-11-14 | Citrix & Systems, Inc. | Systems and methods for caching SNMP data in multi-core and cluster systems |
WO2016025524A1 (en) * | 2014-08-11 | 2016-02-18 | Nodeprime, Inc. | Systems for managing datacenters |
US20180144144A1 (en) * | 2014-09-23 | 2018-05-24 | Accenture Global Services Limited | Industrial security agent platform |
US20160085972A1 (en) * | 2014-09-23 | 2016-03-24 | Accenture Global Services Limited | Industrial security agent platform |
US9864864B2 (en) * | 2014-09-23 | 2018-01-09 | Accenture Global Services Limited | Industrial security agent platform |
US9870476B2 (en) * | 2014-09-23 | 2018-01-16 | Accenture Global Services Limited | Industrial security agent platform |
US20160087958A1 (en) * | 2014-09-23 | 2016-03-24 | Accenture Global Services Limited | Industrial security agent platform |
US10824736B2 (en) * | 2014-09-23 | 2020-11-03 | Accenture Global Services Limited | Industrial security agent platform |
US10516734B2 (en) | 2014-12-16 | 2019-12-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Computer servers for datacenter management |
US11223680B2 (en) * | 2014-12-16 | 2022-01-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Computer servers for datacenter management |
US20160191318A1 (en) * | 2014-12-31 | 2016-06-30 | Schneider Electric Usa Inc. | Systems and methods for programmable device installations |
US9917737B2 (en) * | 2014-12-31 | 2018-03-13 | Schneider Electric USA, Inc. | Systems and methods for programmable device installations |
DE102015212026A1 (en) * | 2015-06-29 | 2016-12-29 | Siemens Aktiengesellschaft | A method of operating a network with multiple node devices and a network |
US10903684B2 (en) | 2015-06-29 | 2021-01-26 | Siemens Aktiengesellschaft | Method for operating a network having multiple node devices, and network |
US11423089B2 (en) * | 2019-09-25 | 2022-08-23 | Dell Products L.P. | System and method for determining application programming interface and object bindings on natural language processed inputs |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8051156B1 (en) | Managing power and performance | |
US9762435B2 (en) | System and method for monitoring and managing data center resources incorporating a common data model repository | |
CN110971614A (en) | Internet of things adaptation method and system, computer equipment and storage medium | |
US9715222B2 (en) | Infrastructure control fabric system and method | |
US10061371B2 (en) | System and method for monitoring and managing data center resources in real time incorporating manageability subsystem | |
US20080098454A1 (en) | Network Management Appliance | |
EP1267518B1 (en) | Multiple device management method and system | |
CN111274001B (en) | Micro-service management platform | |
EP1906347A1 (en) | Object-based service oriented architecture method, apparatus and media | |
US20080033972A1 (en) | Common Information Model for Web Service for Management with Aspect and Dynamic Patterns for Real-Time System Management | |
CN105978716B (en) | Information technoloy equipment and the processing of the monitoring information Homogeneous of rotating ring equipment and three-dimensional rendering method | |
US20150081878A1 (en) | Describing datacenter rack information in management system | |
US10505750B2 (en) | Box for communication and management of devices | |
US20090198549A1 (en) | Automated Repair System and Method for Network-Addressable Components | |
US20030220963A1 (en) | System and method for converting data structures | |
US20180191858A1 (en) | System for managing data of user devices | |
CN109039701B (en) | Method and system for multiple management modes of network equipment based on MIB database | |
US11438191B2 (en) | Interconnection box for user devices | |
Tewari et al. | Standards for Autonomic Computing. | |
US20090019082A1 (en) | System and Method for Discovery of Common Information Model Object Managers | |
US11329841B2 (en) | Method of communication between a remote action manager and a communication box | |
Yongliang et al. | Design of remote monitoring and controlling system for unattended machine room | |
CN110603526B (en) | Infrastructure control architecture system and method | |
Gelle et al. | IT asset management of industrial automation systems | |
Maciel et al. | Resource management in OGSA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHARMA, RATNESH;BASH, CULLENB E.;SHIH, CHIH C.;REEL/FRAME:018144/0944 Effective date: 20060727 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHARMA, RATNESH;BASH, CULLEN E.;PATEL, CHANDRAKANT D.;AND OTHERS;SIGNING DATES FROM 20060727 TO 20061031;REEL/FRAME:018642/0735 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:037079/0001 Effective date: 20151027 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Expired due to failure to pay maintenance fee |
Effective date: 20191101 |